Flavio Toffalini

According to our database1, Flavio Toffalini authored at least 14 papers between 2010 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
ASAINT: a spy App identification system based on network traffic.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Practical static analysis of context leaks in Android applications.
Softw. Pract. Exp., 2019

Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures.
ACM Comput. Surv., 2019

SAFE^d: Self-Attestation For Networks of Heterogeneous Embedded Devices.
CoRR, 2019

ScaRR: Scalable Runtime Remote Attestation for Complex Systems.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Careful-Packing: A Practical and Scalable Anti-Tampering Software Protection enforced by Trusted Computing.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

SCARR: A Novel Scalable Runtime Remote Attestation.
CoRR, 2018

Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures.
CoRR, 2018

Detection of Masqueraders Based on Graph Partitioning of File System Access Events.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Static analysis of context leaks in android applications.
Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice, 2018

2017
TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

2016
Google Dorks: Analysis, Creation, and New Defenses.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2010
REnvDB, a RESTful Database for Pervasive Environmental Wireless Sensor Networks.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010


  Loading...